Abstract
Social media such as Facebook provides a new way to connect, interact and learn. Facebook allows users to share photos and express their feelings by using comments. However, its users are vulnerable to attribute inference attacks where an attacker intends to guess private attributes (e.g., gender, age, political view) of target users through their online profiles and/or their vicinity (e.g., what their friends reveal). Given user-generated pictures on Facebook, we explore in this paper how to launch gender inference attacks on their owners from pictures meta-data composed of: (i) alt-texts generated by Facebook to describe the content of pictures, and (ii) comments posted by friends, friends of friends or regular users. We assume these two meta-data are the only available information to the attacker. Evaluation results demonstrate that our attack technique can infer the gender with an accuracy of 84% by leveraging only alt-texts, 96% by using only comments, and 98% by combining alt-texts and comments. We compute a set of sensitive words that enable attackers to perform effective gender inference attacks. We show the adversary prediction accuracy is decreased by hiding these sensitive words. To the best of our knowledge, this is the first inference attack on Facebook that exploits comments and alt-texts solely.
Keywords
This work is supported by DIGITRUST (http://lue.univ-lorraine.fr/fr/article/digitrust/).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
\(\bigcup \) is the disjoint union.
- 2.
- 3.
- 4.
- 5.
References
Bargh, J.A., McKenna, K.Y., Fitzsimons, G.M.: Can you see the real me? Activation and expression of the “true self” on the internet. J. Soc. Issues 58(1), 33–48 (2002)
Chaabane, A., Acs, G., Kaafar, M.A., et al.: You are what you like! information leakage through users’ interests. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS) (2012)
Chen, Y.-Y., Chen, T., Hsu, W.H., Liao, H.-Y.M., Chang, S.-F.: Predicting viewer affective comments based on image content in social media. In: Proceedings of International Conference on Multimedia Retrieval, p. 233. ACM (2014)
Church, K.W., Hanks, P.: Word association norms, mutual information, and lexicography. Comput. Linguist. 16(1), 22–29 (1990)
Datta, A., Tschantz, M.C., Datta, A.: Automated experiments on ad privacy settings. Proc. Privacy Enhancing Technol. 2015(1), 92–112 (2015)
Fkih, F., Omri, M.N.: Learning the size of the sliding window for the collocations extraction: a ROC-based approach. In: Proceedings of the 2012 International Conference on Artificial Intelligence (ICAI 2012), pp. 1071–1077 (2012)
Gong, N.Z., Liu, B.: Attribute inference attacks in online social networks. ACM Trans. Privacy Secur. (TOPS) 21(1), 3 (2018)
Gong, N.Z., et al.: Joint link prediction and attribute inference using a social-attribute network. ACM Trans. Intell. Syst. Technol. (TIST) 5(2), 27 (2014)
He, J., Chu, W.W., Liu, Z.V.: Inferring privacy information from social networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154–165. Springer, Heidelberg (2006). https://doi.org/10.1007/11760146_14
Kang, R., Brown, S., Kiesler, S.: Why do people seek anonymity on the internet? Informing policy and design. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2657–2666. ACM (2013)
Lee, K.: Combining multiple feature selection methods. In: Mid-Atlantic Student Workshop on Programming Languages and Systems (MASPLAS 2002), p. 12. Citeseer (2002)
Filho, J.A.B.L., Pasti, R., de Castro, L.N.: Gender classification of twitter data based on textual meta-attributes extraction. New Advances in Information Systems and Technologies. AISC, vol. 444, pp. 1025–1034. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31232-3_97
Merler, M., Cao, L., Smith, J.R.: You are what you tweet... pic! gender prediction based on semantic analysis of social media images. In: 2015 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6. IEEE (2015)
Mihaljević, H., Santamaría, L.: Telling the gender from a name (2018)
Miller, Z., Dickinson, B., Hu, W.: Gender prediction on Twitter using stream algorithms with n-gram character features. Int. J. Intell. Sci. 2(04), 143 (2012)
Stavrianou, A., Brun, C., Silander, T., Roux, C.: NLP-based feature extraction for automated tweet classification. Interact. Data Mining Nat. Lang. Process. 145 (2014)
Tobin, A., Merrill, J.B.: Facebook is letting job advertisers target only men (2018)
Tsai, C.-F., Hsiao, Y.-C.: Combining multiple feature selection methods for stock prediction: union, intersection, and multi-intersection approaches. Decis. Support Syst. 50(1), 258–269 (2010)
Weinsberg, U., Bhagat, S., Ioannidis, S., Taft, N.: BlurMe: inferring and obfuscating user gender based on ratings. In: Proceedings of the sixth ACM Conference on Recommender Systems, pp. 195–202. ACM (2012)
Wu, S., Wieland, J., Farivar, O., Schiller, J.: Automatic alt-text: computer-generated image descriptions for blind users on a social network service. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 1180–1192. ACM (2017)
Xu, W., Zhou, X., Li, L.: Inferring privacy information via social relations. In: 2008 IEEE 24th International Conference on Data Engineering Workshop, pp. 525–530. IEEE (2008)
Yurchisin, J., Watchravesringkan, K., McCabe, D.B.: An exploration of identity re-creation in the context of Internet dating. Soc. Beh. Pers.: Int. J. 33(8), 735–750 (2005)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Alipour, B., Imine, A., Rusinowitch, M. (2019). Gender Inference for Facebook Picture Owners. In: Gritzalis, S., Weippl, E., Katsikas, S., Anderst-Kotsis, G., Tjoa, A., Khalil, I. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2019. Lecture Notes in Computer Science(), vol 11711. Springer, Cham. https://doi.org/10.1007/978-3-030-27813-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-27813-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27812-0
Online ISBN: 978-3-030-27813-7
eBook Packages: Computer ScienceComputer Science (R0)